1 /*---------------------------------------------------------------------\
3 | |__ / \ / / . \ . \ |
8 \---------------------------------------------------------------------*/
9 /** \file zypp/FileChecker.cc
13 #include "zypp/base/Logger.h"
14 #include "zypp/FileChecker.h"
15 #include "zypp/ZYppFactory.h"
16 #include "zypp/Digest.h"
17 #include "zypp/KeyRing.h"
21 #undef ZYPP_BASE_LOGGER_LOGGROUP
22 #define ZYPP_BASE_LOGGER_LOGGROUP "FileChecker"
24 ///////////////////////////////////////////////////////////////////
26 { /////////////////////////////////////////////////////////////////
28 ChecksumFileChecker::ChecksumFileChecker( const CheckSum &checksum )
32 void ChecksumFileChecker::operator()( const Pathname &file ) const
34 //MIL << "checking " << file << " file against checksum '" << _checksum << "'" << endl;
35 callback::SendReport<DigestReport> report;
37 if ( _checksum.empty() )
39 MIL << "File " << file << " has no checksum available." << std::endl;
40 if ( report->askUserToAcceptNoDigest(file) )
42 MIL << "User accepted " << file << " with no checksum." << std::endl;
47 ZYPP_THROW( ExceptionType( file.basename() + " has no checksum" ) );
52 CheckSum real_checksum( _checksum.type(), filesystem::checksum( file, _checksum.type() ));
53 if ( (real_checksum != _checksum) )
55 WAR << "File " << file << " has wrong checksum " << real_checksum << " (expected " << _checksum << ")" << endl;
56 if ( report->askUserToAcceptWrongDigest( file, _checksum.checksum(), real_checksum.checksum() ) )
58 WAR << "User accepted " << file << " with WRONG CHECKSUM." << std::endl;
63 ZYPP_THROW( ExceptionType( file.basename() + " has wrong checksum" ) );
69 void NullFileChecker::operator()(const Pathname &file ) const
71 MIL << "+ null check on " << file << endl;
75 void CompositeFileChecker::operator()(const Pathname &file ) const
77 //MIL << _checkers.size() << " checkers" << endl;
78 for ( list<FileChecker>::const_iterator it = _checkers.begin(); it != _checkers.end(); ++it )
82 //MIL << "+ chk" << endl;
87 ERR << "Invalid checker" << endl;
92 void CompositeFileChecker::add( const FileChecker &checker )
93 { _checkers.push_back(checker); }
96 SignatureFileChecker::SignatureFileChecker( const Pathname & signature )
97 : _signature(signature)
100 SignatureFileChecker::SignatureFileChecker()
103 void SignatureFileChecker::setKeyContext(const KeyContext & keycontext)
104 { _context = keycontext; }
106 void SignatureFileChecker::addPublicKey( const Pathname & publickey, const KeyContext & keycontext )
107 { addPublicKey( PublicKey(publickey), keycontext ); }
109 void SignatureFileChecker::addPublicKey( const PublicKey & publickey, const KeyContext & keycontext )
111 getZYpp()->keyRing()->importKey(publickey, false);
112 _context = keycontext;
115 void SignatureFileChecker::operator()(const Pathname &file ) const
117 if ( (! PathInfo(_signature).isExist()) && (!_signature.empty()) )
119 ZYPP_THROW( ExceptionType("Signature " + _signature.asString() + " not found.") );
122 MIL << "checking " << file << " file validity using digital signature.." << endl;
123 _fileValidated = false;
124 _fileAccepted = getZYpp()->keyRing()->verifyFileSignatureWorkflow( file, file.basename(), _signature, _fileValidated, _context );
126 if ( !_fileAccepted )
127 ZYPP_THROW( ExceptionType( "Signature verification failed for " + file.basename() ) );
130 /******************************************************************
132 ** FUNCTION NAME : operator<<
133 ** FUNCTION TYPE : std::ostream &
135 std::ostream & operator<<( std::ostream & str, const FileChecker & obj )
140 /////////////////////////////////////////////////////////////////
142 ///////////////////////////////////////////////////////////////////